CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3734  CVE-2001-0928  Candidate  Buffer overflow in the permitted function of GNOME gtop daemon (libgtop_daemon) in libgtop 1.0.13 and earlier may allow remote attackers to execute arbitrary code via long authentication data.  Modified (20050511)  ACCEPT(2) Baker, Foat | MODIFY(1) Frech | NOOP(4) Armstrong, Christey, Cole, Wall  Frech> XF:XF:libgtop-permitted-bo(7635) | CONFIRM:MandrakeSoft Security Advisory MDKSA-2001:094, | "libgtop", | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-094.php3 | CONFIRM:Debian Security Advisory DSA-098-1, "libgtop: format string | vulnerability and buffer overflow", | http://www.debian.org/security/2002/dsa-098 | Christey> BID:3594 | URL:http://www.securityfocus.com/bid/3594 | CONECTIVA:CLA-2002:448 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000448 | MANDRAKE:MDKSA-2001:094 | URL:http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-094.php3 | DEBIAN:DSA-098 | URL:http://www.debian.org/security/2002/dsa-098 | Christey> DEBIAN:DSA-301 | URL:http://www.debian.org/security/2003/dsa-301  View
3956  CVE-2001-1152  Candidate  Baltimore Technologies WEBsweeper 4.02, when used to manage URL blacklists, allows remote attackers to bypass blacklist restrictions and connect to unauthorized web servers by modifying the requested URL, including (1) a // (double slash), (2) a /SUBDIR/.. where the desired file is in the parentdir, (3) a /./, or (4) URL-encoded characters.  Proposed (20020315)  ACCEPT(2) Baker, Foat | MODIFY(1) Frech | NOOP(4) Armstrong, Cole, Green, Wall | REJECT(1) Ziese  Ziese> ACCEPT REASON: Rejection logic makes sense, products have to be used as | intended. Misuse is not a security vulnerability per se. | Frech> XF:content-slash-bypass-filter(6816) | Baker> I would say that this is a vulnerability, since their website | touts URL filtering as a feature of the product. If the product has to | filter URL"s then the product needs to be able to filter URL"s properly, | or the product fails. | Here is the list of features, quoted from their product page for | web sweeper: | | "Key Features | Policy based web security implementation for information posted to and downloaded from the web | Protects against unauthorized users accessing the web utilizing user authentication | Provides URL filtering blocking stopping inappropriate site access | Protects against loss of confidential information, viruses, portable code, and inappropriate content entering and | leaving via web based e-mail accounts such as hotmail and Yahoo | Auditing and reporting on individual and group web traffic | Customizable "Block" and "Progress Message" pages "  View
4632  CVE-2002-0240  Candidate  PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.  Proposed (20020502)  ACCEPT(2) Baker, Frech | MODIFY(1) Cox | NOOP(4) Armstrong, Cole, Foat, Wall  CHANGE> [Cox changed vote from REVIEWING to MODIFY] | Cox> Change to "....installed with Apache 2.0 for Windows"  View
332  CVE-1999-0333  Candidate  HP OpenView Omniback allows remote execution of commands as root via spoofing, and local users can gain root access via a symlink attack.  Modified (19990925-01)  ACCEPT(2) Baker, Frech | MODIFY(1) Prosser | RECAST(1) Christey  Prosser> additional source | HP Security Bulletin 85 | http://us-support.external.hp.com | http://europe-support.external.hp.com | Christey> Two separate bugs, so SF-LOC says this candidate should be | split | Christey> ADDREF CIAC:J-007 | URL:http://ciac.llnl.gov/ciac/bulletins/j-007.shtml  View
253  CVE-1999-0254  Candidate  A hidden SNMP community string in HP OpenView allows remote attackers to modify MIB tables and obtain sensitive information.  Proposed (19990726)  ACCEPT(2) Baker, Frech | NOOP(1) Wall | REVIEWING(1) Christey  Christey> What is the proper level of abstraction to use here? Should | we have a separate entry for each different default community | string? See: | http://cve.mitre.org/Board_Sponsors/archives/msg00242.html and | http://cve.mitre.org/Board_Sponsors/archives/msg00250.html | http://cve.mitre.org/Board_Sponsors/archives/msg00251.html | | Until the associated content decisions have been approved | by the Editorial Board, this candidate cannot be accepted | for inclusion in CVE.  View

Page 783 of 20943, showing 5 records out of 104715 total, starting on record 3911, ending on 3915

Actions